{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T06:15:37Z","timestamp":1725862537475},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319428352"},{"type":"electronic","value":"9783319428369"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-42836-9_15","type":"book-chapter","created":{"date-parts":[[2016,8,2]],"date-time":"2016-08-02T22:30:38Z","timestamp":1470177038000},"page":"162-173","source":"Crossref","is-referenced-by-count":1,"title":["Identifying Discrepant Tags in RFID-enabled Supply Chains"],"prefix":"10.1007","author":[{"given":"Caidong","family":"Gu","sequence":"first","affiliation":[]},{"given":"Wei","family":"Gong","sequence":"additional","affiliation":[]},{"given":"Amiya","family":"Nayak","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,4]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Benedetti, D., Maselli, G., Petrioli, C.: Fast identification of mobile RFID tags. In: Proceedings of IEEE MASS (2012)","DOI":"10.1109\/MASS.2012.6502503"},{"key":"15_CR2","unstructured":"Wal-Mart\u2019s RFID Refresh. RFID Journal (2007)"},{"key":"15_CR3","unstructured":"Lunn, D.: Employee Theft: Eliminate The Opportunity Guest Series Part 1"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Liu, J., Xiao, B., Kai, B., Chen, L.: Efficient distributed query processing in large rfid-enabled supply chains. In: Proceedings of IEEE INFOCOM (2014)","DOI":"10.1109\/INFOCOM.2014.6847936"},{"key":"15_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1007\/978-3-642-05290-3_25","volume-title":"On the Move to Meaningful Internet Systems: OTM 2009 Workshops","author":"H Ziekow","year":"2009","unstructured":"Ziekow, H., Fabian, B., M\u00fcller, C.: High-speed access to RFID data: meeting real-time requirements in distributed value chains. In: Meersman, R., Herrero, P., Dillon, T. (eds.) OTM 2009 Workshops. LNCS, vol. 5872, pp. 142\u2013151. Springer, Heidelberg (2009)"},{"issue":"1","key":"15_CR6","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1145\/200836.200880","volume":"42","author":"M Blum","year":"1995","unstructured":"Blum, M., Kannan, S.: Designing programs that check their work. J. ACM (JACM) 42(1), 269\u2013291 (1995)","journal-title":"J. ACM (JACM)"},{"issue":"9","key":"15_CR7","doi-asserted-by":"crossref","first-page":"2213","DOI":"10.1109\/TIT.2003.815784","volume":"49","author":"Y Minsky","year":"2003","unstructured":"Minsky, Y., Trachtenberg, A., Zippel, R.: Set reconciliation with nearly optimal communication complexity. IEEE Trans. Inf. Theor. 49(9), 2213\u20132218 (2003)","journal-title":"IEEE Trans. Inf. Theor."},{"key":"15_CR8","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-21738-3","volume-title":"Introduction to Numerical Analysis","author":"J Stoer","year":"2002","unstructured":"Stoer, J., Bulirsch, R.: Introduction to Numerical Analysis, vol. 12. Springer, Heidelberg (2002)"},{"key":"15_CR9","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-3188-3","volume-title":"Effective Polynomial Computation","author":"RE Zippel","year":"1993","unstructured":"Zippel, R.E.: Effective Polynomial Computation. Springer, Heidelberg (1993)"},{"issue":"2","key":"15_CR10","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1016\/0022-0000(85)90041-8","volume":"31","author":"P Flajolet","year":"1985","unstructured":"Flajolet, P., Martin, G.N.: Probabilistic counting algorithms for database applications. J. Comput. Syst. Sci. 31(2), 182\u2013209 (1985)","journal-title":"J. Comput. Syst. Sci."},{"key":"15_CR11","unstructured":"http:\/\/www.csim.com\/"},{"key":"15_CR12","unstructured":"http:\/\/www.shoup.net\/ntl\/"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Kodialam, M., Nandagopal, T.: Fast and reliable estimation schemes in RFID systems. In: Proceedings of ACM MobiCom (2006)","DOI":"10.1145\/1161089.1161126"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Zheng, Y., Li, M., Qian, C.: PET: Probabilistic estimating tree for large-scale RFID estimation. In: Proceedings of IEEE ICDCS (2011)","DOI":"10.1109\/ICDCS.2011.9"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Shahzad, M., Liu, A.X.: Every bit counts: fast and scalable RFID estimation. In: Proceedings of ACM MobiCom (2012)","DOI":"10.1145\/2348543.2348588"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Zhang, R., Liu, Y., Zhang, Y., Sun, J.: Fast identification of the missing tags in a large RFID system. In: Proceedings of IEEE SECON (2011)","DOI":"10.1109\/SAHCN.2011.5984908"},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Li, T., Chen, S., Ling, Y.: Identifying the missing tags in a large RFID system. In: Proceedings of ACM MOBIHOC (2010)","DOI":"10.1145\/1860093.1860095"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Tan, C., Sheng, B., Li, Q.: How to monitor for missing RFID tags. In: Proceedings of IEEE ICDCS, pp. 295\u2013302 (2008)","DOI":"10.1109\/ICDCS.2008.67"},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"Bolotnyy, L., Robins, G.: Physically unclonable function-based security and privacy in RFID systems. In: Proceedings of IEEE PERCOM (2007)","DOI":"10.1109\/PERCOM.2007.26"},{"key":"15_CR20","series-title":"Lecture Notes in Computer Science","first-page":"50","volume-title":"Security in Pervasive Computing","author":"SA Weis","year":"2004","unstructured":"Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter, D., M\u00fcller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 50\u201359. Springer, Heidelberg (2004)"},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Lu, L., Liu, Y., Li, X.: Refresh: weak privacy model for RFID systems. In: Proceedings of IEEE INFOCOM (2010)","DOI":"10.1109\/INFCOM.2010.5462153"},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"Yang, L., Han, J., Qi, Y., Liu, Y.: Identification-free batch authentication for RFID tags. In: Proceedings of IEEE ICNP (2010)","DOI":"10.1109\/ICNP.2010.5762764"},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"Lee, C.H., Chung, C.W.: Efficient storage scheme and query processing for supply chain management using RFID. In: Proceedings of ACM SIGMOD (2008)","DOI":"10.1145\/1376616.1376648"},{"issue":"5","key":"15_CR24","doi-asserted-by":"crossref","first-page":"326","DOI":"10.14778\/1952376.1952382","volume":"4","author":"Z Cao","year":"2011","unstructured":"Cao, Z., Sutton, C., Diao, Y., Shenoy, P.: Distributed inference and query processing for rfid tracking and monitoring. Proc. VLDB Endowment 4(5), 326\u2013337 (2011)","journal-title":"Proc. VLDB Endowment"}],"container-title":["Lecture Notes in Computer Science","Wireless Algorithms, Systems, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-42836-9_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T15:48:29Z","timestamp":1498319309000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-42836-9_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319428352","9783319428369"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-42836-9_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}